Read the blog in your language:
-
Senaste inläggen
Följ mig på Twitter
Mina tweets-
Gör sällskap med 38 andra följare
Kategorier
Författararkiv: Anders
Problem sending or receiving protected emails externally?
Last week was the tenth time I helped an organization that couldn’t send protected emails externally. In other words, it’s worth a blog article. It’s all about a very common misconfiguration of Conditional Access. The scenario is that (RMS) protected … Fortsätt läsa
Protect your environment by reviewing your applications!
To be able to protect our organization as well as preventing information leakage we not only need to secure our own environment we also need to identify what kind of apps and services that are in use by our users. … Fortsätt läsa
Restrict information sharing based on sensitivity
Both Teams and SharePoint are good solutions for sharing and collaborating with sensitive information internally as well as externally. With help of Sensitivity labels, we can define rules and permissions for everything from allow/block external guests, sharing of files, as … Fortsätt läsa
Classify information based on Teams location
Information classification is used to separate information into different categories. Everything from legal cases to sensitive projects often includes different kinds of information. It could contain both public information meant to be spread/shared officially and more sensitive highly confidential information … Fortsätt läsa
Detect and protect sensitive IT information
What we have seen is that organizations are often good at verifying permissions and access to their IT (security) systems, but what most organizations miss is to restrict and protect extracted data such as logs and reports from these systems. … Fortsätt läsa
Attack Simulation Training
For decades successful intrusions have occurred by tricking a user to either execute something or leak sensitive information like passwords or other secrets. As our security solutions are improved and protection increases, we can clearly see how attacks in the … Fortsätt läsa
Microsoft 365 Defender – The success story from Forefront Stirling
Svenska – English I have now been working for over 15 years with Microsoft security solutions and I have just been recognized as a Microsoft MVP (Most Valuable Professional) for the 11th year in a row. It is now that … Fortsätt läsa
Publicerat i Microsoft Defender
1 kommentar
Microsoft 365 Defender – Historien från Forefront Stirling
Swedish – English Jag har nu jobbat i över 15 år med Microsofts säkerhetslösningar och jag har precis blivit utnämnd till Microsoft Most Valuable Proffesional, MVP för 11:e året i rad. Det är nu jag börjar känna mig gammal, lite … Fortsätt läsa
Publicerat i Microsoft Defender
1 kommentar
Conditional Access for sensitive information
Every organization have some extra sensitive information that requires more caution from its users. Common examples that emphasize sensitivity can be for example extra authentication or terms of use approval before they get access to the information. It’s all about … Fortsätt läsa
MCAS and AAD Identity Protection threat detection and automatic response
Now it’s time for part 2 around MCAS. (Part 1) This blog post is about threat detection and automatic response where we start with Azure AD Identity Protection. Azure AD Identity Protection monitor and responds on threats against our Azure … Fortsätt läsa